Automation of recon process for ethical hackers
VR Saraswathi, IS Ahmed, SM Reddy… - … for Advancement in …, 2022 - ieeexplore.ieee.org
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …
performing every little check manually. So as to make the Recon process (Info gathering …
An empirical study: automated subdomain takeover threat detection
Y Wang, Z Li, T Wu, I Duncan… - … Conference on Cyber …, 2021 - ieeexplore.ieee.org
Due to the development of E-commerce, phishing attacks are one of the major current cyber
threats. Phishing attacks have become increasingly sophisticated and have exploited both …
threats. Phishing attacks have become increasingly sophisticated and have exploited both …
Mitigating phishing threats
Y Wang - 2023 - research-repository.st-andrews.ac …
Due to the rapid development of the Internet, modern daily behaviour has become more
efficient and convenient. The Internet has become an indispensable element in our daily life …
efficient and convenient. The Internet has become an indispensable element in our daily life …
Detecting Subdomain TakeOver Threats and Real-Time Alerting for Rapid Response
M Biswas, SP Singh, SK Shaha - 2023 26th International …, 2023 - ieeexplore.ieee.org
In today's cyber landscape, the expansion of online services and applications has
introduced a critical concern cyber security threats, such as subdomain takeovers. These …
introduced a critical concern cyber security threats, such as subdomain takeovers. These …
Bug Bounty Recon Automation Using Bash Scripting
R Kaur, A Chanda, A Gupta, M Das… - Available at SSRN …, 2023 - papers.ssrn.com
Bug bounty programs are an effective way for companies to discover and address potential
security vulnerabilities in their systems. As part of these programs, security researchers use …
security vulnerabilities in their systems. As part of these programs, security researchers use …
Consolidating reconnaissance tools and techniques for penetration testing under a single platform
MR Gadekar - 2023 - norma.ncirl.ie
The reconnaissance stage of penetration testing could be greatly enhanced by integrating
several reconnaissance tools and techniques into a single platform. This may also result in a …
several reconnaissance tools and techniques into a single platform. This may also result in a …
[PDF][PDF] Automation of Recon Process for Ethical Hackers
IA Sk - researchgate.net
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …
performing every little check manually. So as to make the Recon process (Info gathering …
[PDF][PDF] Automation of Recon process for Ethical Hackers
S Akshay, IA Sk, S Reddy, S Reddy - researchgate.net
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …
performing every little check manually. So as to make the Recon process (Info gathering …
[PDF][PDF] Терро Моайад
T Moayad - naukaru.ru
Аннотация В сфере современной разработки программного обеспечения конвейеры
непрерывной интеграции и непрерывного развертывания (CI/CD) служат …
непрерывной интеграции и непрерывного развертывания (CI/CD) служат …